-
All
-
Online
-
Filters
IT Governance Europe Ltd courses
- Course
- Distance Learning
...Users of ISO28001:2007 will: Define the portion of an international supply chain within which they have established security, Conduct security assessments...
- Course
- Distance Learning
...Security Management Systems for the Supply Chain - Requirements for Bodies Providing Audit and Certification of Supply Chain Security Management Systems...
- Course
- Distance Learning
...security management system. It explains the underlying principles of ISO28000 and describes the intent, typical inputs, processes and typical outputs...
- Course
- Distance Learning
...and use is also covered for service provider implementations. Overview of the Book: Understand the security concepts behind the AAA framework...
- Course
- Distance Learning
...of access control models, new RBAC standards, new in-depth case studies and discussions on role engineering and the design of role-based systems...
- Course
- Distance Learning
...models of access control systems. The book is also suitable for advanced-level students in security programming and system design. Authors: Messaoud Benantar Publisher...
- Vocational qualification
- Distance Learning
...This same accessibility also makes Electronic Access Control ideal for hard-pressed practitioners. Author: Gerard Honey Publisher: NEWNES ISBN...
- Course
- Distance Learning
...and comprehensive. The fact that you have this book in your hands is a step in the right direction. Read it, learn from it. And then put its lessons into practice...
- Course
- Distance Learning
...the book focuses on security aspects of data warehousing and data mining. It also covers threats to privacy due to data mining, and concludes with an exploration... Learn about: Data Management...
- Course
- Distance Learning
...Build your expertise for developing more-secure applications with ASP.NET 2.0. with this bestselling book. Description Build your expertise for developing...
- Course
- Distance Learning
...Reviews of this Book: ' It's about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures...
- Course
- Distance Learning
...This means knowing and understanding common risks (including implementation bugs and architectural flaws), designing for security, and subjecting all software...
- Course
- Distance Learning
...proven methodology that measurably minimizes security bugs-the Security Development Lifecycle (SDL ) . In this long-awaited book, security experts Michael...
- Course
- Distance Learning
...Gain an in-depth, conceptual understanding-along with practical ways to integrate threat modeling into your development efforts: Help anticipate attacks...
- Course
- Distance Learning
...the authors who wrote the immensely popular, award-winning book Writing Secure Code . Developers get first-hand insights into design decisions and practical...
- Course
- Distance Learning
...designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews...
- Course
- Distance Learning
...and they do so with a minimum of complex mathematics and technical jargon. Description Applied Cryptanalysis focuses on practical attacks on real-world ciphers...
- Course
- Distance Learning
...' - Dr. Dobb's Journal '. . .easily ranks as one of the most authoritative in its field.' - PC Magazine '..the bible of code hackers.' - The Millennium...
- Course
- Distance Learning
...Author: David Hook Publisher: John Wiley ISBN 10: 0764596330 ISBN 13: 9780764596339 Pages: 448 Format: Soft Cover Published Date: August 2005 Availability...
- Course
- Distance Learning
...you fully master the material. From mathematical fundamentals and an overview of cryptographic systems... to details on unkeyed, secret...